The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


SQL Server passwords


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 11 Jul 2002 15:54:22 +0100
From: David Litchfield <[email protected]>
To: [email protected], [email protected]
Subject: SQL Server passwords

Hi all,
I've received many responses about my paper on SQL Server passwords
 http://www.nextgenss.com/papers/cracking-sql-passwords.pdf ] and how they
are hashed, most of those responses being along the lines of 'but only sa
can get the hashes so what is the use in knowing this?'.

Well there are two things that should be noted here.

Firstly it gives the SQL Server administrator a chance to audit their users'
password strength. This is an oft use practice by system administrators.

Secondly, and more importantly, a normal, low privileged user can exploit a
vulnerability in SQL Server to gain access to the hashes. For anyone who has
not read it yet I'd recommend reading Chris Anley's paper on 'runtime
patching'.
[ http://www.nextgenss.com/papers/violating_database_security.pdf ] This
discusses a three byte [runtime] patch that makes every login equivalent to
'sa' by exploiting a buffer overrun vulnerability. In the wake of so many
such vulnerabilities (pwdencrypt(), opendatasource(), openrowset(), etc.,
etc.) one should consider this as a potential threat. [Apply those patches a
soon as possible!]

Actually as a third and less likely option, if someone can access backup
tapes etc this may also yeild the hashes.

Cheers,
David Litchfield

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру